{"id":5252,"date":"2025-01-29T11:03:42","date_gmt":"2025-01-29T16:03:42","guid":{"rendered":"https:\/\/www.monmouth.edu\/technology\/?page_id=5252"},"modified":"2025-07-03T15:12:41","modified_gmt":"2025-07-03T19:12:41","slug":"cybergraph","status":"publish","type":"page","link":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/","title":{"rendered":"CyberGraph"},"content":{"rendered":"<h3 class=\"wp-block-heading\" id=\"what-is-it\">What is it?<\/h3>\n\n\n<p><strong>CyberGraph<\/strong> alerts email recipients to indicators of risk with colored warning banners that display at the top of a suspicious email. The banner color indicates how suspicious the email is. It also contains information to help you decide whether the email really is dangerous:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"733\" height=\"257\" src=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png\" alt=\"\" class=\"wp-image-5463\" style=\"width:922px;height:auto\" srcset=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png 733w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1-300x105.png 300w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1-150x53.png 150w\" sizes=\"auto, (max-width: 733px) 100vw, 733px\" \/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-does-it-do\">What does it do?<\/h3>\n\n\n<p>As you mark emails, CyberGraph continuously learns about the types of emails we receive and from who, so over time, you will see fewer banners applied.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-you-will-see\">What you will see:<\/h3>\n\n\n<p>When an email seems suspicious, CyberGraph will add a colored banner to it. <strong>Blue <\/strong>is <strong>Needs Your Attention<\/strong>, <strong>Orange<\/strong> is <strong>Could Be Suspicious<\/strong>, <strong>Pink<\/strong> is <strong>Suspicious<\/strong>, and <strong>Red<\/strong> is <strong>Dangerous<\/strong>.<\/p>\n\n\n\n<p>Below is an example of an email where a Red banner was applied. This message was flagged for attention because it contained a link to an external site, specifically Google Forms. Additionally, we can assume that Human Resources will not be directing us to an external site such as Google Forms to enter confidential information. Lastly, it is important to note that Monmouth University does not have a \u201cCompensation Office\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"338\" src=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/03\/Screenshot-2025-03-06-154401.png\" alt=\"A close-up screenshot of an email labeled as dangerous.\" class=\"wp-image-5322\" style=\"box-shadow:var(--wp--preset--shadow--natural);width:806px;height:auto\" srcset=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/03\/Screenshot-2025-03-06-154401.png 728w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/03\/Screenshot-2025-03-06-154401-300x139.png 300w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/03\/Screenshot-2025-03-06-154401-150x70.png 150w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-you-will-do\">What you will do:<\/h3>\n\n\n<ol class=\"wp-block-list\">\n<li>Click the <strong>Report<\/strong> or <strong>Mark as Safe<\/strong> button in the banner* in the email to report the email.<\/li>\n\n\n\n<li>A browser window will open with a dialog box <strong>This Message Needs Your Attention<\/strong>. Your options are to select <strong>Report as Dangerous<\/strong>, <strong>Report as Spam<\/strong>, or <strong>Mark as Safe<\/strong> and select <strong>Submit<\/strong> (if the message appears to be dangerous, you will select <strong>Report as dangerous to my security team<\/strong>).<\/li>\n\n\n\n<li>The next screen confirms your selection.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"178\" src=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1-1024x178.png\" alt=\"\" class=\"wp-image-5464\" style=\"box-shadow:none;width:1280px;height:auto\" srcset=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1-1024x178.png 1024w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1-300x52.png 300w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1-768x133.png 768w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1-1536x267.png 1536w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1-2048x356.png 2048w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1-150x26.png 150w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Asset-1.png 7183w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>*The first time you interact with CyberGraph you may be asked to login to Mimecast. Use your Monmouth University username and password:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"357\" src=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/01\/Cybergraphlogin.png\" alt=\"An image of Mimecast's login page.\" class=\"wp-image-5263\" style=\"width:609px;height:auto\" srcset=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/01\/Cybergraphlogin.png 530w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/01\/Cybergraphlogin-300x202.png 300w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/01\/Cybergraphlogin-150x101.png 150w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<p><strong>CyberGraph<\/strong>&nbsp;empowers you to make smarter choices about your email responses. You are helping to protect yourself, your colleagues, and the University.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is it? CyberGraph alerts email recipients to indicators of risk with colored warning banners that display at the top of a suspicious email. The banner color indicates how suspicious the email is. It also contains information to help you decide whether the email really is dangerous: What does it do? As you mark emails, [&hellip;]<\/p>\n","protected":false},"author":2638,"featured_media":0,"parent":5216,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mu_eop_enabled":false,"_mu_eop_name":"","_mu_eop_name_override":false,"_mu_eop_description":"","_mu_eop_description_override":false,"_mu_eop_url":"","_mu_eop_url_override":false,"_mu_eop_program_type":"","_mu_eop_educational_credential":"","_mu_eop_time_to_complete":"","_mu_eop_number_of_credits":"","_mu_eop_occupational_category":"","_mu_eop_occupational_category_code":"","_mu_eop_program_prerequisites":"","_mu_eop_application_deadline":"","_mu_eop_application_start_date":"","_mu_eop_start_date":"","_mu_eop_end_date":"","_mu_eop_day_of_week":"","_mu_eop_time_of_day":"","_mu_eop_educational_program_mode":"","_mu_eop_financial_aid_eligible":"","_mu_eop_maximum_enrollment":"","_mu_eop_offers_price":"","_mu_eop_offers_currency":"USD","_mu_eop_offers_price_per":"","_mu_eop_offers_preset":"","_mu_eop_salary_upon_completion":"","_mu_eop_training_salary":"","_mu_eop_recognized_by_name":"","_mu_eop_recognized_by_url":"","_mu_eop_concentrations":"","_mu_eop_identifier_cip":"","_mu_eop_provider_name":"","_mu_eop_provider_name_override":false,"_mu_eop_provider_url":"","_mu_eop_provider_address":"","_mu_eop_provider_city":"","_mu_eop_provider_state":"","_mu_eop_provider_zip":"","_mu_eop_provider_country":"","footnotes":""},"class_list":["post-5252","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CyberGraph | Campus Technology | Monmouth University<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberGraph | Campus Technology\" \/>\n<meta property=\"og:description\" content=\"What is it? CyberGraph alerts email recipients to indicators of risk with colored warning banners that display at the top of a suspicious email. The banner color indicates how suspicious the email is. It also contains information to help you decide whether the email really is dangerous: What does it do? As you mark emails, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/\" \/>\n<meta property=\"og:site_name\" content=\"Campus Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T19:12:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"733\" \/>\n\t<meta property=\"og:image:height\" content=\"257\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/\",\"name\":\"CyberGraph | Campus Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png\",\"datePublished\":\"2025-01-29T16:03:42+00:00\",\"dateModified\":\"2025-07-03T19:12:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#primaryimage\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png\",\"contentUrl\":\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png\",\"width\":733,\"height\":257},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Support\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mimecast\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CyberGraph\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/#website\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/\",\"name\":\"Campus Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.monmouth.edu\/technology\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyberGraph | Campus Technology | Monmouth University","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/","og_locale":"en_US","og_type":"article","og_title":"CyberGraph | Campus Technology","og_description":"What is it? CyberGraph alerts email recipients to indicators of risk with colored warning banners that display at the top of a suspicious email. The banner color indicates how suspicious the email is. It also contains information to help you decide whether the email really is dangerous: What does it do? As you mark emails, [&hellip;]","og_url":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/","og_site_name":"Campus Technology","article_modified_time":"2025-07-03T19:12:41+00:00","og_image":[{"width":733,"height":257,"url":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/","url":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/","name":"CyberGraph | Campus Technology","isPartOf":{"@id":"https:\/\/www.monmouth.edu\/technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#primaryimage"},"image":{"@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#primaryimage"},"thumbnailUrl":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png","datePublished":"2025-01-29T16:03:42+00:00","dateModified":"2025-07-03T19:12:41+00:00","breadcrumb":{"@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#primaryimage","url":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png","contentUrl":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2025\/07\/Untitled-1.png","width":733,"height":257},{"@type":"BreadcrumbList","@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybergraph\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.monmouth.edu\/technology\/"},{"@type":"ListItem","position":2,"name":"Support","item":"https:\/\/www.monmouth.edu\/technology\/support\/"},{"@type":"ListItem","position":3,"name":"Mimecast","item":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/"},{"@type":"ListItem","position":4,"name":"CyberGraph"}]},{"@type":"WebSite","@id":"https:\/\/www.monmouth.edu\/technology\/#website","url":"https:\/\/www.monmouth.edu\/technology\/","name":"Campus Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.monmouth.edu\/technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/users\/2638"}],"replies":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/comments?post=5252"}],"version-history":[{"count":16,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5252\/revisions"}],"predecessor-version":[{"id":5467,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5252\/revisions\/5467"}],"up":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5216"}],"wp:attachment":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/media?parent=5252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}